摘要:
The present invention provides a strictly non-blocking WDM cross-connect that utilizes a relatively small number of wavelength interchangers. The cross-connect of the present invention comprises two fabrics and one or more wavelength interchangers that interconnect the fabrics. The fabrics are either pathwise strictly non-blocking or pathwise wide-sense non-blocking. In the former case, the WDM cross-connect is strictly non-blocking, i.e., both pathwise and wavelength strictly non-blocking. In the latter case, the cross-connect is wavelength strictly non-blocking and is pathwise wide-sense non-blocking, i.e., a routing algorithm is required to ensure that any sequence of connection requests and withdrawals can be routed without disturbing any currently routed requests. In accordance with the preferred embodiment of the present invention, the cross-connect is strictly non-blocking and comprises a minimum number of wavelength interchangers, namely, 2k−1, where k is a positive integer equal to the number of input fibers and to the number of output fibers of the cross-connect. The cross-connect is capable of providing a route for any sequence of connection requests and withdrawals without having to disturb any currently routed requests and without the need for a routing algorithm.
摘要:
The present invention describes a validation stamp for protecting the integrity of a signature affixed to an electronic document. The validation stamp of the present invention includes a validation body and a validation signature. The validation stamp is affixed to a signed document having a document body and a document signature. The document signature and the validation signature are derived from an electronic signature defined by geometric and timing information. Specifically, the validation signature includes the timing information, and possibly the geometric information, of the electronic signature, whereas the document signature includes the geometric information, and not the timing information, of the electronic signature. To verify the integrity of the signature on the electronic document, the validation signature is first decrypted and then compared, along with the document signature, against the signed document and geometric and timing information of a signature known for the authorized signator of the electronic document.
摘要:
A network design method for Ethernet-type networks exhibiting capacities sufficient for operation during normal periods as well those as periods when a single node or link has failed.
摘要:
Transmissive WSS-based mesh nodes of degree N, N≧3, includes N node port apparatuses connected to provide a multiple wavelength channel signal with reciprocal connectivity between the N node ports. Each node port apparatus has an input port and N−1 output ports and comprises either (1) a coupler connected to said input port and having N−1 outputs, (2) a transmissive 1×(N−1) WSS connected to said input port and responsive to a control signal C for establishing a switching connection to one of its N−1 outputs, or (3) a coupler connected to said input port and having X+1 outputs including one output connected to an input of a transmissive 1×Y WSS having Y outputs, where X+Y equals N−1, the sum of the remaining X outputs of the coupler and the Y outputs of the transmissive 1×Y WSS being the N−1 output ports of the node port apparatus. Each of the N−1 output ports from each node port apparatus is connected to a different output port of each of the other N−1 node port apparatuses such that a connection made from one input port of a node port apparatus to an input port of a different node port apparatus always passes through only one WSS and at least one coupler, the connection being established in response to a control signal applied to said one WSS.
摘要:
We disclose a method for routing a set of demands in a ring network that comprises nodes interconnected by directed links, in which each demand may be routed clockwise or counterclockwise. According to our method, a linear program is solved to obtain a set of routing variables that minimize an objective function. Each routing variable corresponds to a respective one of the demands, and has a value, exemplarily, on the closed interval from 0 to 1. A value of 1 signifies, e.g., clockwise routing, and a value of 0 signifies counterclockwise routing. The objective function describes the value of a load, defined on each link and maximized over all links of the network, so that a solution of the linear program provides a minimum value of the maximized load. The method further comprises rounding the routing variables so that the value of each routing variable falls at 1 or 0. This rounding is carried out such that the maximized load does not exceed the previously-obtained minimum value of the maximized load. The method further comprises routing each of the demands clockwise or counterclockwise, in accordance with the value of its respective routing variable.
摘要:
Routing information is exchanged between edge routers in different autonomous systems that independently define their routing policies. A Simple Path Vector Protocol extends the prior art Border Gateway Protocol in a manner that is guaranteed to converge by adding a new attribute to the routing messages sent by an edge router to its peers in the different systems. This attribute is a path history, which is dynamically computed at each router as the routing path to a particular destination is changed. The path history attribute is sent in a routing message by a router to its peers together with the sending router's path to that destination. By observing the dynamic path history that is computed at a router as a received routing message from a peer router that contains a history attribute is processed, a cycle can be identified in the newly computed history and associated with a policy conflict at that receiving router's associated autonomous system. A path whose history contains a cycle is automatically suppressed as a permitted path to that destination.
摘要:
A wavelength division multiplex (WDM) cross-connect architecture that can selectively cross-connect, at a wavelength granularity, wavelength channels from any of a plurality of input WDM optical facilities (e.g., fibers) to any of a plurality of output WDM optical facilities. The architecture is based on multi-wavelength modules, which are capable of routing simultaneously N wavelengths. The number of required modules scales only with k2 or less (i.e., k2 modules with N complexity), where k is the number of input/output fibers. The significant reduction in complexity is traded for a decrease in blocking performance; one of the disclosed architectures is strictly non-blocking in the space domain and rearrangeably non-blocking in the wavelength domain, whereas two others are rearrangeably non-blocking in both the wavelength and space domain. Since the wavelength channels are optically multiplexed in the interconnection fibers, only a small number of optical amplifiers are needed to compensate for the inevitable transmission loss in the interconnection fabric.
摘要:
A method and apparatus for secure entry and authentication of a multi-digit personal identification number (PIN) is described. An authenticator generates a random number, and provides that number, or a function thereof, to a user. The user is prompted to encode each digit of the PIN number, one digit at a time, by performing a mathematical operation on the digit using the number provided by the authenticator. The encoded PIN digit is provided to the authenticator which reverses the steps performed by the user to regenerate and verify the user's PIN. The user is prompted to encode subsequent digits of the PIN only after (1) a previous digit is encoded, (2) the encoded digit is provided to an input device for the authenticator, (3) and a new random number is generated and that random number, or a function thereeof, is provided to the user for encoding a subsequent PIN digit.
摘要:
A method for sequentially encrypting the digits of a personal identification number, and an apparatus for practicing the method, are disclosed. According to the method, a random number is generated and supplied to a user requesting access to a system. The user encrypts a digit of his personal identification number by performing a function on the random number and the digit and then provides the encrypted digit to a verification system. A second random number is then generated, provided to the user, applied to encrypt another digit of the user's personal identification number and then input to the verification system. The dialogue between verification system and the user continues, digit by digit, until each digit of the personal identification number has been provided to the verification system in encrypted form. The verification system then compares the encrypted input with the user's personal identification number accessed from memory.